On 6/14/23, Undescribed Horrific Abuse, One Victim & Survivor of Many
<[email protected]> wrote:
> [then with social influence and other modern concerns cryptography of
> thought -- how to manage access with it -- becomes a wider concern
>
> in the end, there is large area [where you can take over somebody's
> conscjousness but because you hve livd a different life nd hold
> different goals cannot ckmpletely recovdr their biological prviate
> keys -- but you can think you did ...

[for example, imagine you mind control pegasus, the flying horse, so
as to experiment wth the flyi

Reply via email to